US6363150B1 - Billing method for customers having IP telephony service with multiple levels of security - Google Patents

Billing method for customers having IP telephony service with multiple levels of security Download PDF

Info

Publication number
US6363150B1
US6363150B1 US09/475,286 US47528699A US6363150B1 US 6363150 B1 US6363150 B1 US 6363150B1 US 47528699 A US47528699 A US 47528699A US 6363150 B1 US6363150 B1 US 6363150B1
Authority
US
United States
Prior art keywords
security
signal
touch tone
change
security level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/475,286
Inventor
Vijay K Bhagavath
Hopeton S Walker
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Corp
Original Assignee
AT&T Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Corp filed Critical AT&T Corp
Priority to US09/475,286 priority Critical patent/US6363150B1/en
Assigned to AT&T CORP reassignment AT&T CORP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BHAGAVATH, VIJAY K, WALKER, HOPETON S
Application granted granted Critical
Publication of US6363150B1 publication Critical patent/US6363150B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/253Telephone sets using digital voice transmission
    • H04M1/2535Telephone sets using digital voice transmission adapted for voice communication over an Internet Protocol [IP] network

Definitions

  • the present invention generally relates to the field of subscriber telecommunications and related systems. More particularly, the invention is directed to a method for initiating a security feature request at the beginning or during an active telephone call and billing the subscriber in accordance with the level of selected security.
  • the prior art is devoid any effective way to prevent unauthorized reception of private information during a subscriber telephone call. This problem is of particular significance in IP telephony in comparison to telephone calls placed over the so-called twisted pair. Security usually is not a major issue when using conventional telephone lines because the communication does not go over public or private networks which are outside of the control of the telephone company. All of the switching and transmission infrastructure of a conventional twisted pair telephone system usually is owned by the telephone company and can be maintained in a secure manner.
  • IP telephony is necessarily conducted over public and private IP networks which are not under the control of a single authority.
  • the very nature of the Internet prevents end-to-end control of the infrastructure by the same authority.
  • security in IP networks is a major concern.
  • the Internet Protocol lacks the necessary features that allow users to select the required level of security that may be required to ensure privacy. Accordingly, there exists a need in the art to provide a method for secure IP telephony services. Ideally, the security features should be available to the subscriber on an as needed basis. Whether the subscriber chooses to implement a security feature will depend on the sensitivity of the information to be protected.
  • the level of security should only adequate for the need in the interest of minimizing the cost. Dynamic selection of security in accordance with need and billing the user in accordance with the selection has not been achieved in the prior art. Accordingly, there remains a need for such a feature in sensitive communications systems.
  • the present invention provides a method for securing IP telephony calls over networks that have a shared media architecture and billing the subscriber accordingly.
  • networks include, for example, hybrid fiber coaxial cable (HFC), Microwave Multi point Distribution Systems (MMDS) and Local Multi point Distribution Systems (LMDS).
  • HFC hybrid fiber coaxial cable
  • MMDS Microwave Multi point Distribution Systems
  • LMDS Local Multi point Distribution Systems
  • the invention enables telephone subscribers to select one of a plurality of security levels that may be required to ensure privacy during a call. Since each level of security is based on a different encryption and authentication algorithm, the levels of security can be incrementally priced. Accordingly, selecting an algorithm which is deemed to be very secure can be billed to the subscriber at a higher rate than an algorithm that is deemed to be less secure. This cost differential to the subscriber can be justified because of the direct correlation between the algorithms sophistication, quality and cost.
  • Subscribers will also have the ability to vary the level of security in real-time. Thus, if a user is on a call and decides to change the security level of the call to ensure better security, the user can enter the appropriate DTMF sequence to change to the required security level and be billed accordingly.
  • FIG. 1 is a block diagram illustrating the implementation of a method of initiating a security feature request in a telephone network in accordance with the present invention.
  • FIG. 2 is a block diagram illustrating the implementation of a method of initiating a security and billing feature request in an IP telephone network in a cable television plant environment.
  • FIG. 1 illustrates the implementation of the present invention in a twisted-pair telephone system.
  • the system includes user telephones 1 and 2 and security feature control device 3 .
  • Device 3 is located in the four-wire portion 4 of the telephone network where the two directions (transmit and receive) of the voice signal are carried separately.
  • Device 3 includes speech and DTMF tone recognition circuitry as is known in the art. Thus, device 3 can reliably detect and respond to security feature requests during an active telephone call.
  • security feature control device 3 is listening only to signals coming from telephone 1 toward telephone 2 .
  • an identical security feature control device 3 may be used to listen for requests for security features coming from telephone 2 .
  • device 3 If device 3 recognizes the correct combination of DTMF tones or spoken words from telephone 1 , it will either invoke the appropriate security feature or it will connect telephone 1 to a network device 5 that can prompt for detailed information about the desired security feature. In the latter case, telephone 1 may be temporarily connected to a keep-alive signal such as music-on-hold 7 by switching device 8 . Switching device 8 also makes available to the caller a menu 6 of prompts and security service options. The requested security features 9 , 10 , and/or 11 , for example, may then be provided to the caller in accordance with the caller's request.
  • Speech recognition technology has advanced to the point that a spoken command such as “Go To Security Level Two” to initiate a change in security levels.
  • FIG. 2 illustrated the present invention in an IP telephony environment.
  • FIG. 2 shows a conventional analog telephone 1 connected to the Internet 3 via PSTN 2 .
  • a transport network 4 for a cable television system is also connected to Internet 2 .
  • a cable television system is but one environment in which an IP telephony system may be implemented.
  • Transport network 4 includes a firewall proxy 6 and an IP router 7 as known in the prior art. Also included is an encryption/decryption module 8 , database 9 and a software controller 5 for encryption/decryption module 8 which is added to transport network 4 by way of the present invention.
  • Transport network 4 is connected to cable head end 10 which is well known in the prior art and serves as the central control and delivery point for media services to subscribers of the cable system.
  • the cable system includes distribution fiber cable 12 which connects each subscriber's cable modem 13 to cable head end 10 via fiber node 11 .
  • One or more distribution amplifiers 14 may also be provided, depending on the size of the cable plant.
  • FIG. 2 Also shown in FIG. 2 is a Personal Computer (PC) 16 which is connected to the subscriber cable modems along with an IP telephone 15 .
  • FIG. 2 further illustrates remote shared media access with telephony end-points 17 connected to Internet 3 .
  • PC Personal Computer
  • One or the other subscribers at telephone sets 1 and 15 shown in FIG. 2 can enter appropriate DTMF tones at call initiation, or during a call, to enable and select the appropriate level of security required.
  • the user dials a number along with the appropriate dialing sequence required to activate the feature.
  • Software controller 5 for security module 8 then decodes the sequence and determines the level of security that is required by the user.
  • Software controller 5 then instructs encryption/decryption module 8 to setup the appropriate level of security. Additionally, when the feature is activated, software controller 5 can initiate a verbal confirmation message informing the user that the feature is activated and optionally announce or display the associate charges. In the event that the user does not want to incur the charge associated with the selected security level, the user would have the option of selecting a cheaper alternative security level.
  • a predefined database 9 containing a list of selected numbers along with the appropriate level of security that is required when those number are called.
  • the database is consulted to determine if the called number is one that is listed which requires a predefined level of security treatment. If the number is listed in the database, then the predefined level of security is used. If the called number is not listed in the database, then either no security treatment is utilized or a default level specified by the subscriber is utilized.
  • the telephone service provider can enter the information from the provisioning terminal or the subscriber could have the capability of entering their own information.
  • the user may enter information from a telephone such as an analog phone, a video telephone or an IP telephone.
  • the user may enter information via an Internet interface having access to the database.
  • the customer premises equipment (CPE) or other terminating device may have intelligence built into the device to detect the number that is being dialed. Once the number is detected, the device compares the dialed number to a list of numbers stored in its internal memory.
  • CPE customer premises equipment
  • the appropriate level of security is determined from the device's memory and the appropriate DTMF tone used to enable and select the feature is automatically generated by the device.
  • the instant invention enables subscribers to select one of a plurality of security levels that may be required to ensure privacy during a call. Since each level of security is based on a different encryption and authentication algorithm, the levels of security will be incrementally priced. Consequently, selecting an algorithm which is deemed to be very secure will cost more than selecting an algorithm that is deemed to be less secure. This is because of the direct correlation between the algorithm sophistication, quality and cost.
  • Database 9 illustrated in FIG. 2 may also be used to maintain a billing schedule which correlates a billing fee for each level of security. When a level of security is selected, controller 5 consults this schedule with respect to the fee for the selected level. Controller 5 may also signal the user as to the fee and give the user an opportunity to accept or select a different level of security.

Abstract

A method for initiating a security and billing feature request at the beginning or during an active telephone call. The telephone subscriber can select one of a plurality of security levels that may be required to ensure privacy during a call. Since each level of security is based on a different encryption and authentication algorithm, the levels of security can be incrementally priced. Thus, selecting an algorithm which is deemed to be very secure can be billed to the subscriber at a higher rate than an algorithm that is deemed to be less secure.

Description

BACKGROUND OF THE INVENTION
The present invention generally relates to the field of subscriber telecommunications and related systems. More particularly, the invention is directed to a method for initiating a security feature request at the beginning or during an active telephone call and billing the subscriber in accordance with the level of selected security.
There are many instances when a telephone subscriber wishes to place a call with the assurance that the call will be secure and free from monitoring by unauthorized persons. This need for privacy is becoming more and more important as online services continue to proliferate. For example, many banks now offer their customers online banking services which can be conducted over the telephone using the telephone touch tone keypad.
While such services usually require a Personal Identification Number (PIN) as well as other identifying information, a skilled pirate can easily obtain this information by tapping into the telephone subscriber's phone line. Using readily available equipment, the DTMF tones which customarily are used to enter identifying information at the beginning of an online banking session can be easily decoded. Similar piracy opportunities exist when credit card information is given over an unsecured telephone line.
The prior art is devoid any effective way to prevent unauthorized reception of private information during a subscriber telephone call. This problem is of particular significance in IP telephony in comparison to telephone calls placed over the so-called twisted pair. Security usually is not a major issue when using conventional telephone lines because the communication does not go over public or private networks which are outside of the control of the telephone company. All of the switching and transmission infrastructure of a conventional twisted pair telephone system usually is owned by the telephone company and can be maintained in a secure manner.
On the other hand, IP telephony is necessarily conducted over public and private IP networks which are not under the control of a single authority. The very nature of the Internet prevents end-to-end control of the infrastructure by the same authority. Thus, security in IP networks is a major concern.
Currently, the Internet Protocol lacks the necessary features that allow users to select the required level of security that may be required to ensure privacy. Accordingly, there exists a need in the art to provide a method for secure IP telephony services. Ideally, the security features should be available to the subscriber on an as needed basis. Whether the subscriber chooses to implement a security feature will depend on the sensitivity of the information to be protected.
It is, of course, possible to implement a high level of security on the network on a permanent basis. In other words, the telephone network would always be in its most secure state. There are trade offs, however, with taking this approach. Implementing a level of network security sufficient to accomplish the task results in additional loading of the network. Such loading may likely result in unacceptable delays which adversely effect the quality of the telephone call. It may not be possible, even with the use of faster and more expensive network equipment to completely eliminate the delay. Of course the use of more expensive equipment increases the cost of the telephone call.
Another factor which militates against always operating the network in its most secure state is the fact many countries have regulations which limit the export of encryption technology. Thus, IP telephone calls conducted across country borders must take into account such regulations. In many cases, these regulations would prevent strong encryptions algorithms from being employed during inter-country IP telephone calls.
In addition to the concerns discussed above with respect to selecting an appropriate level of security, the corresponding issue of cost must be addressed as well. In most cases, the level of security made available in any system has a direct relationship to its cost. It is generally true that the better the security the higher the cost.
Ideally, the level of security should only adequate for the need in the interest of minimizing the cost. Dynamic selection of security in accordance with need and billing the user in accordance with the selection has not been achieved in the prior art. Accordingly, there remains a need for such a feature in sensitive communications systems.
SUMMARY OF THE PRESENT INVENTION
Accordingly, it is an objective of the present invention to obviate the above-noted shortcomings and disadvantages of present unsecured telephone services.
It is a still further objective of the present invention to provide a method of implementing a security feature in telephone services and a corresponding billing system.
It is a still further objective of the present invention to provide a method for implementing a security feature and billing system in telephone services which can be readily implemented using existing communication networks.
The present invention provides a method for securing IP telephony calls over networks that have a shared media architecture and billing the subscriber accordingly. Such networks include, for example, hybrid fiber coaxial cable (HFC), Microwave Multi point Distribution Systems (MMDS) and Local Multi point Distribution Systems (LMDS).
The invention enables telephone subscribers to select one of a plurality of security levels that may be required to ensure privacy during a call. Since each level of security is based on a different encryption and authentication algorithm, the levels of security can be incrementally priced. Accordingly, selecting an algorithm which is deemed to be very secure can be billed to the subscriber at a higher rate than an algorithm that is deemed to be less secure. This cost differential to the subscriber can be justified because of the direct correlation between the algorithms sophistication, quality and cost.
Subscribers will also have the ability to vary the level of security in real-time. Thus, if a user is on a call and decides to change the security level of the call to ensure better security, the user can enter the appropriate DTMF sequence to change to the required security level and be billed accordingly.
BRIEF DESCRIPTION OF THE DRAWINGS
The novel features of the present invention are set out with particularity in the appended claims, but the invention will be understood more fully and clearly from the following detailed description of the invention as set forth in the accompanying drawings in which:
FIG. 1 is a block diagram illustrating the implementation of a method of initiating a security feature request in a telephone network in accordance with the present invention; and
FIG. 2 is a block diagram illustrating the implementation of a method of initiating a security and billing feature request in an IP telephone network in a cable television plant environment.
BRIEF DESCRIPTION OF THE PREFERRED EMBODIMENT
A preferred embodiment of the present invention will now be described with reference to the drawings.
FIG. 1 illustrates the implementation of the present invention in a twisted-pair telephone system. The system includes user telephones 1 and 2 and security feature control device 3. Device 3 is located in the four-wire portion 4 of the telephone network where the two directions (transmit and receive) of the voice signal are carried separately. Device 3 includes speech and DTMF tone recognition circuitry as is known in the art. Thus, device 3 can reliably detect and respond to security feature requests during an active telephone call.
As shown in FIG. 1, security feature control device 3 is listening only to signals coming from telephone 1 toward telephone 2. Although not shown in FIG. 1, an identical security feature control device 3 may be used to listen for requests for security features coming from telephone 2.
If device 3 recognizes the correct combination of DTMF tones or spoken words from telephone 1, it will either invoke the appropriate security feature or it will connect telephone 1 to a network device 5 that can prompt for detailed information about the desired security feature. In the latter case, telephone 1 may be temporarily connected to a keep-alive signal such as music-on-hold 7 by switching device 8. Switching device 8 also makes available to the caller a menu 6 of prompts and security service options. The requested security features 9, 10, and/or 11, for example, may then be provided to the caller in accordance with the caller's request.
Another approach to initiating a change in security level is through spoken word commands. Speech recognition technology has advanced to the point that a spoken command such as “Go To Security Level Two” to initiate a change in security levels.
FIG. 2 illustrated the present invention in an IP telephony environment. FIG. 2 shows a conventional analog telephone 1 connected to the Internet 3 via PSTN 2. Also connected to Internet 2 is a transport network 4 for a cable television system. A cable television system is but one environment in which an IP telephony system may be implemented.
Transport network 4 includes a firewall proxy 6 and an IP router 7 as known in the prior art. Also included is an encryption/decryption module 8, database 9 and a software controller 5 for encryption/decryption module 8 which is added to transport network 4 by way of the present invention.
Transport network 4 is connected to cable head end 10 which is well known in the prior art and serves as the central control and delivery point for media services to subscribers of the cable system. The cable system includes distribution fiber cable 12 which connects each subscriber's cable modem 13 to cable head end 10 via fiber node 11. One or more distribution amplifiers 14 may also be provided, depending on the size of the cable plant. Also shown in FIG. 2 is a Personal Computer (PC) 16 which is connected to the subscriber cable modems along with an IP telephone 15. FIG. 2 further illustrates remote shared media access with telephony end-points 17 connected to Internet 3.
One or the other subscribers at telephone sets 1 and 15 shown in FIG. 2 can enter appropriate DTMF tones at call initiation, or during a call, to enable and select the appropriate level of security required. The user dials a number along with the appropriate dialing sequence required to activate the feature. Software controller 5 for security module 8 then decodes the sequence and determines the level of security that is required by the user.
Software controller 5 then instructs encryption/decryption module 8 to setup the appropriate level of security. Additionally, when the feature is activated, software controller 5 can initiate a verbal confirmation message informing the user that the feature is activated and optionally announce or display the associate charges. In the event that the user does not want to incur the charge associated with the selected security level, the user would have the option of selecting a cheaper alternative security level.
In another embodiment of the present invention, there may exist in transport network 4 a predefined database 9 containing a list of selected numbers along with the appropriate level of security that is required when those number are called. As a result, when a call is placed, the database is consulted to determine if the called number is one that is listed which requires a predefined level of security treatment. If the number is listed in the database, then the predefined level of security is used. If the called number is not listed in the database, then either no security treatment is utilized or a default level specified by the subscriber is utilized.
In setting up database 9, the telephone service provider can enter the information from the provisioning terminal or the subscriber could have the capability of entering their own information. In one embodiment for entering the information, the user may enter information from a telephone such as an analog phone, a video telephone or an IP telephone. In yet another embodiment, the user may enter information via an Internet interface having access to the database.
In a future embodiment of the invention, the customer premises equipment (CPE) or other terminating device may have intelligence built into the device to detect the number that is being dialed. Once the number is detected, the device compares the dialed number to a list of numbers stored in its internal memory.
If a match is found, the appropriate level of security is determined from the device's memory and the appropriate DTMF tone used to enable and select the feature is automatically generated by the device.
As described above, the instant invention enables subscribers to select one of a plurality of security levels that may be required to ensure privacy during a call. Since each level of security is based on a different encryption and authentication algorithm, the levels of security will be incrementally priced. Consequently, selecting an algorithm which is deemed to be very secure will cost more than selecting an algorithm that is deemed to be less secure. This is because of the direct correlation between the algorithm sophistication, quality and cost.
Database 9 illustrated in FIG. 2 may also be used to maintain a billing schedule which correlates a billing fee for each level of security. When a level of security is selected, controller 5 consults this schedule with respect to the fee for the selected level. Controller 5 may also signal the user as to the fee and give the user an opportunity to accept or select a different level of security.
It should be obvious from the above-discussed apparatus embodiment that numerous other variations and modifications of the apparatus of this invention are possible, and such will readily occur to those skilled in the art. Accordingly, the scope of this invention is not to be limited to the embodiment disclosed, but is to include any such embodiments as may be encompassed within the scope of the claims appended hereto.

Claims (17)

We claim:
1. A method of allowing a user of an IP telephone network having multiple levels of security to initiate a change in security level during an in-progress call, said method comprising the steps of:
receiving and recognizing a security signal entered by the telephone network user;
associating said security signal with a request for a change in said security level;
providing the requested change in said security level in accordance with said security signal; and
assigning a cost value to said selection.
2. The method of claim 1, wherein said security signal is a touch tone signal from a DTMF touch pad.
3. The method of claim 1, wherein said security signal is an electronic signal from an electronic display having a user interface.
4. The method of claim 2, wherein the step of receiving said touch tone signal includes the step of measuring the duration of said touch tone signal and discarding said touch tone signal when said duration is less than a predetermined amount.
5. The method of claim 1, further including the step of providing an acknowledgment prompt to the user indicating that said request for a change in said security level is being processed.
6. The method of claim 1, further including the step of connecting any other users of said in-progress call to an audible signal that encourages those users to wait while said change in security level is initiated.
7. The method of claim 2, further including the steps of receiving and recognizing a voice signal resulting from the telephone network user speaking a predetermined word;
associating the combination of said voice signal and said touch tone signal with a request for a change in said security level; and
providing the requested change in security level in accordance with said combination of touch tone signal and voice signal.
8. The method of claim 7, wherein the step of receiving said touch tone signal includes the step of measuring the duration of said touch tone signal and discarding said touch tone signal when said duration is less than a predetermined amount.
9. The method of claim 7, further including the step of measuring the duration of time between said step of receiving a touch tone signal and said step of receiving a voice signal and discarding said signals when said duration is greater than a predetermined amount.
10. The method of claim 7 further including the step of recognizing the context created by said touch tone signal and using said context to improve the accuracy of said recognition of said voice signal.
11. The method of claim 7, further including the step of recognizing the context created by said touch tone signal and using said context to simplify said recognition of said voice signal.
12. The method of claim 7, further including the step of recognizing the context created by said voice signal and using said context to distinguish said touch tone signals intended to invoke a change in said security level from touch tone signals not intended to invoke a change in said security level.
13. The method of claim 7, wherein the step of associating said touch tone signal and voice signal with a request for a change in said security level further includes the step of associating said combination of touch tone signal and voice signal with a call security feature group containing a plurality of security levels.
14. The method of claim 7, wherein said voice signal is a predetermined spoken word.
15. The method of claim 1 further including the step of maintaining a database correlating said cost value with each said selected change in security level.
16. The method of claim 15, further including the step of identifying to the user said cost value.
17. The method of claim 16, wherein said user may request a different securlity in response to said identifying step.
US09/475,286 1999-12-30 1999-12-30 Billing method for customers having IP telephony service with multiple levels of security Expired - Lifetime US6363150B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/475,286 US6363150B1 (en) 1999-12-30 1999-12-30 Billing method for customers having IP telephony service with multiple levels of security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/475,286 US6363150B1 (en) 1999-12-30 1999-12-30 Billing method for customers having IP telephony service with multiple levels of security

Publications (1)

Publication Number Publication Date
US6363150B1 true US6363150B1 (en) 2002-03-26

Family

ID=23886935

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/475,286 Expired - Lifetime US6363150B1 (en) 1999-12-30 1999-12-30 Billing method for customers having IP telephony service with multiple levels of security

Country Status (1)

Country Link
US (1) US6363150B1 (en)

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040111391A1 (en) * 2002-11-08 2004-06-10 Hitachi, Ltd. Command processing system by a management agent
US20040174860A1 (en) * 2003-03-04 2004-09-09 Van Hammond Timothy J. System and method for facilitating IP telephony applications
US20040205004A1 (en) * 2000-02-22 2004-10-14 Paramvir Bahl Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US20040215956A1 (en) * 2000-02-22 2004-10-28 Microsoft Corporation Methods and systems for accessing networks, methods and systems for accessing the internet
US20050060539A1 (en) * 2003-09-15 2005-03-17 Steve Anspach Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure commercial transport
US20050138358A1 (en) * 2000-02-22 2005-06-23 Microsoft Corporation Authentication methods and systems for accessing networks authentication methods and systems for accessing the internet
US20060100884A1 (en) * 2002-08-30 2006-05-11 Thorner Jan Bengt K Intelligent peripheral for speech recognition in networks
WO2006081712A1 (en) * 2005-02-07 2006-08-10 Zte Corporation A method for switching the level of the plaintext and cyphertext during the conversation
US7149896B1 (en) 2000-05-05 2006-12-12 Microsoft Corporation Methods and systems for providing security for accessing networks, methods and systems for providing security for accessing the internet
US7421583B1 (en) * 2000-06-19 2008-09-02 Xerox Corp System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof
US7564975B2 (en) 2002-11-19 2009-07-21 Lg Electronics Inc. Method of ciphering data and/or voice call to be transferred in mobile communication system and method of deactivating the ciphering
US9118655B1 (en) 2014-01-24 2015-08-25 Sprint Communications Company L.P. Trusted display and transmission of digital ticket documentation
US9161227B1 (en) 2013-02-07 2015-10-13 Sprint Communications Company L.P. Trusted signaling in long term evolution (LTE) 4G wireless communication
US9161325B1 (en) 2013-11-20 2015-10-13 Sprint Communications Company L.P. Subscriber identity module virtualization
US9171243B1 (en) 2013-04-04 2015-10-27 Sprint Communications Company L.P. System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device
US9183412B2 (en) 2012-08-10 2015-11-10 Sprint Communications Company L.P. Systems and methods for provisioning and using multiple trusted security zones on an electronic device
US9183606B1 (en) 2013-07-10 2015-11-10 Sprint Communications Company L.P. Trusted processing location within a graphics processing unit
US9185626B1 (en) 2013-10-29 2015-11-10 Sprint Communications Company L.P. Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning
US9191388B1 (en) 2013-03-15 2015-11-17 Sprint Communications Company L.P. Trusted security zone communication addressing on an electronic device
US9191522B1 (en) * 2013-11-08 2015-11-17 Sprint Communications Company L.P. Billing varied service based on tier
US9208339B1 (en) 2013-08-12 2015-12-08 Sprint Communications Company L.P. Verifying Applications in Virtual Environments Using a Trusted Security Zone
US9210576B1 (en) 2012-07-02 2015-12-08 Sprint Communications Company L.P. Extended trusted security zone radio modem
US9215180B1 (en) 2012-08-25 2015-12-15 Sprint Communications Company L.P. File retrieval in real-time brokering of digital content
US9226145B1 (en) 2014-03-28 2015-12-29 Sprint Communications Company L.P. Verification of mobile device integrity during activation
US9230085B1 (en) 2014-07-29 2016-01-05 Sprint Communications Company L.P. Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services
US9268959B2 (en) 2012-07-24 2016-02-23 Sprint Communications Company L.P. Trusted security zone access to peripheral devices
US9282898B2 (en) 2012-06-25 2016-03-15 Sprint Communications Company L.P. End-to-end trusted communications infrastructure
CN105488417A (en) * 2014-12-25 2016-04-13 哈尔滨安天科技股份有限公司 Method and system for realizing system security level division
US9324016B1 (en) 2013-04-04 2016-04-26 Sprint Communications Company L.P. Digest of biographical information for an electronic device with static and dynamic portions
US9374363B1 (en) 2013-03-15 2016-06-21 Sprint Communications Company L.P. Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device
US9384498B1 (en) 2012-08-25 2016-07-05 Sprint Communications Company L.P. Framework for real-time brokering of digital content delivery
US9443088B1 (en) 2013-04-15 2016-09-13 Sprint Communications Company L.P. Protection for multimedia files pre-downloaded to a mobile device
US9454723B1 (en) 2013-04-04 2016-09-27 Sprint Communications Company L.P. Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device
US9473945B1 (en) 2015-04-07 2016-10-18 Sprint Communications Company L.P. Infrastructure for secure short message transmission
US9560519B1 (en) 2013-06-06 2017-01-31 Sprint Communications Company L.P. Mobile communication device profound identity brokering framework
US9578664B1 (en) 2013-02-07 2017-02-21 Sprint Communications Company L.P. Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system
US9613208B1 (en) 2013-03-13 2017-04-04 Sprint Communications Company L.P. Trusted security zone enhanced with trusted hardware drivers
US9779232B1 (en) 2015-01-14 2017-10-03 Sprint Communications Company L.P. Trusted code generation and verification to prevent fraud from maleficent external devices that capture data
US9817992B1 (en) 2015-11-20 2017-11-14 Sprint Communications Company Lp. System and method for secure USIM wireless network access
US9819679B1 (en) 2015-09-14 2017-11-14 Sprint Communications Company L.P. Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers
US9838869B1 (en) 2013-04-10 2017-12-05 Sprint Communications Company L.P. Delivering digital content to a mobile device via a digital rights clearing house
US9838868B1 (en) 2015-01-26 2017-12-05 Sprint Communications Company L.P. Mated universal serial bus (USB) wireless dongles configured with destination addresses
US9906958B2 (en) 2012-05-11 2018-02-27 Sprint Communications Company L.P. Web server bypass of backend process on near field communications and secure element chips
US10282719B1 (en) 2015-11-12 2019-05-07 Sprint Communications Company L.P. Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit
US10499249B1 (en) 2017-07-11 2019-12-03 Sprint Communications Company L.P. Data link layer trust signaling in communication network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5867494A (en) * 1996-11-18 1999-02-02 Mci Communication Corporation System, method and article of manufacture with integrated video conferencing billing in a communication system architecture
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US6292481B1 (en) * 1997-09-16 2001-09-18 Bell Atlantic Network Services, Inc. Inter-carrier signaling and usage accounting architecture for internet telephony

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5867494A (en) * 1996-11-18 1999-02-02 Mci Communication Corporation System, method and article of manufacture with integrated video conferencing billing in a communication system architecture
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US6292481B1 (en) * 1997-09-16 2001-09-18 Bell Atlantic Network Services, Inc. Inter-carrier signaling and usage accounting architecture for internet telephony

Cited By (68)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7089415B2 (en) 2000-02-22 2006-08-08 Microsoft Corporation Authentication methods and systems for accessing networks authentication methods and systems for accessing the internet
US20040205004A1 (en) * 2000-02-22 2004-10-14 Paramvir Bahl Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US7548976B2 (en) 2000-02-22 2009-06-16 Microsoft Corporation Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US20040215956A1 (en) * 2000-02-22 2004-10-28 Microsoft Corporation Methods and systems for accessing networks, methods and systems for accessing the internet
US20040221157A1 (en) * 2000-02-22 2004-11-04 Microsoft Corporation Methods and systems for accessing networks methods and systems for accessing the internet
US20050022001A1 (en) * 2000-02-22 2005-01-27 Microsoft Corporation Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US8255569B1 (en) 2000-02-22 2012-08-28 Microsoft Corporation Methods and systems for compressing data packets
US20050138358A1 (en) * 2000-02-22 2005-06-23 Microsoft Corporation Authentication methods and systems for accessing networks authentication methods and systems for accessing the internet
US7444510B2 (en) * 2000-02-22 2008-10-28 Microsoft Corporation Methods and systems for accessing networks, methods and systems for accessing the internet
US20060168454A1 (en) * 2000-02-22 2006-07-27 Microsoft Corporation Methods and systems for accessing networks, methods and systems for accessing the internet
US7500263B2 (en) 2000-02-22 2009-03-03 Microsoft Corporation Methods and systems for accessing networks, methods and systems for accessing the Internet
US7406707B2 (en) * 2000-02-22 2008-07-29 Microsoft Corporation Methods and systems for accessing networks methods and systems for accessing the internet
US7313237B2 (en) 2000-02-22 2007-12-25 Microsoft Corporation Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US7149896B1 (en) 2000-05-05 2006-12-12 Microsoft Corporation Methods and systems for providing security for accessing networks, methods and systems for providing security for accessing the internet
US7444669B1 (en) 2000-05-05 2008-10-28 Microsoft Corporation Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
US7421583B1 (en) * 2000-06-19 2008-09-02 Xerox Corp System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof
US20060100884A1 (en) * 2002-08-30 2006-05-11 Thorner Jan Bengt K Intelligent peripheral for speech recognition in networks
US7606713B2 (en) * 2002-08-30 2009-10-20 Telefonaktiebolaget L M Ericsson (Publ) Intelligent peripheral for speech recognition in networks
US7257843B2 (en) * 2002-11-08 2007-08-14 Hitachi, Ltd. Command processing system by a management agent
US20040111391A1 (en) * 2002-11-08 2004-06-10 Hitachi, Ltd. Command processing system by a management agent
US7430761B2 (en) 2002-11-08 2008-09-30 Hitachi, Ltd. Command processing system by a management agent
US20060272029A1 (en) * 2002-11-08 2006-11-30 Hitachi, Ltd. Command processing system by a management agent
US7564975B2 (en) 2002-11-19 2009-07-21 Lg Electronics Inc. Method of ciphering data and/or voice call to be transferred in mobile communication system and method of deactivating the ciphering
EP1422864B2 (en) 2002-11-19 2010-07-07 LG Electronics Inc. Method of activating/deactivating encryption of data/voice in a mobile communication system
US20040174860A1 (en) * 2003-03-04 2004-09-09 Van Hammond Timothy J. System and method for facilitating IP telephony applications
US20050060539A1 (en) * 2003-09-15 2005-03-17 Steve Anspach Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure commercial transport
US7533259B2 (en) * 2003-09-15 2009-05-12 Telecommunication Systems, Inc. Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure commercial transport
WO2006081712A1 (en) * 2005-02-07 2006-08-10 Zte Corporation A method for switching the level of the plaintext and cyphertext during the conversation
US9906958B2 (en) 2012-05-11 2018-02-27 Sprint Communications Company L.P. Web server bypass of backend process on near field communications and secure element chips
US10154019B2 (en) 2012-06-25 2018-12-11 Sprint Communications Company L.P. End-to-end trusted communications infrastructure
US9282898B2 (en) 2012-06-25 2016-03-15 Sprint Communications Company L.P. End-to-end trusted communications infrastructure
US9210576B1 (en) 2012-07-02 2015-12-08 Sprint Communications Company L.P. Extended trusted security zone radio modem
US9268959B2 (en) 2012-07-24 2016-02-23 Sprint Communications Company L.P. Trusted security zone access to peripheral devices
US9183412B2 (en) 2012-08-10 2015-11-10 Sprint Communications Company L.P. Systems and methods for provisioning and using multiple trusted security zones on an electronic device
US9811672B2 (en) 2012-08-10 2017-11-07 Sprint Communications Company L.P. Systems and methods for provisioning and using multiple trusted security zones on an electronic device
US9384498B1 (en) 2012-08-25 2016-07-05 Sprint Communications Company L.P. Framework for real-time brokering of digital content delivery
US9215180B1 (en) 2012-08-25 2015-12-15 Sprint Communications Company L.P. File retrieval in real-time brokering of digital content
US9578664B1 (en) 2013-02-07 2017-02-21 Sprint Communications Company L.P. Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system
US9769854B1 (en) 2013-02-07 2017-09-19 Sprint Communications Company L.P. Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system
US9161227B1 (en) 2013-02-07 2015-10-13 Sprint Communications Company L.P. Trusted signaling in long term evolution (LTE) 4G wireless communication
US9613208B1 (en) 2013-03-13 2017-04-04 Sprint Communications Company L.P. Trusted security zone enhanced with trusted hardware drivers
US9191388B1 (en) 2013-03-15 2015-11-17 Sprint Communications Company L.P. Trusted security zone communication addressing on an electronic device
US9374363B1 (en) 2013-03-15 2016-06-21 Sprint Communications Company L.P. Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device
US9712999B1 (en) 2013-04-04 2017-07-18 Sprint Communications Company L.P. Digest of biographical information for an electronic device with static and dynamic portions
US9171243B1 (en) 2013-04-04 2015-10-27 Sprint Communications Company L.P. System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device
US9324016B1 (en) 2013-04-04 2016-04-26 Sprint Communications Company L.P. Digest of biographical information for an electronic device with static and dynamic portions
US9454723B1 (en) 2013-04-04 2016-09-27 Sprint Communications Company L.P. Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device
US9838869B1 (en) 2013-04-10 2017-12-05 Sprint Communications Company L.P. Delivering digital content to a mobile device via a digital rights clearing house
US9443088B1 (en) 2013-04-15 2016-09-13 Sprint Communications Company L.P. Protection for multimedia files pre-downloaded to a mobile device
US9560519B1 (en) 2013-06-06 2017-01-31 Sprint Communications Company L.P. Mobile communication device profound identity brokering framework
US9949304B1 (en) 2013-06-06 2018-04-17 Sprint Communications Company L.P. Mobile communication device profound identity brokering framework
US9183606B1 (en) 2013-07-10 2015-11-10 Sprint Communications Company L.P. Trusted processing location within a graphics processing unit
US9208339B1 (en) 2013-08-12 2015-12-08 Sprint Communications Company L.P. Verifying Applications in Virtual Environments Using a Trusted Security Zone
US9185626B1 (en) 2013-10-29 2015-11-10 Sprint Communications Company L.P. Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning
US9191522B1 (en) * 2013-11-08 2015-11-17 Sprint Communications Company L.P. Billing varied service based on tier
US9161325B1 (en) 2013-11-20 2015-10-13 Sprint Communications Company L.P. Subscriber identity module virtualization
US9118655B1 (en) 2014-01-24 2015-08-25 Sprint Communications Company L.P. Trusted display and transmission of digital ticket documentation
US9226145B1 (en) 2014-03-28 2015-12-29 Sprint Communications Company L.P. Verification of mobile device integrity during activation
US9230085B1 (en) 2014-07-29 2016-01-05 Sprint Communications Company L.P. Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services
CN105488417A (en) * 2014-12-25 2016-04-13 哈尔滨安天科技股份有限公司 Method and system for realizing system security level division
US9779232B1 (en) 2015-01-14 2017-10-03 Sprint Communications Company L.P. Trusted code generation and verification to prevent fraud from maleficent external devices that capture data
US9838868B1 (en) 2015-01-26 2017-12-05 Sprint Communications Company L.P. Mated universal serial bus (USB) wireless dongles configured with destination addresses
US9473945B1 (en) 2015-04-07 2016-10-18 Sprint Communications Company L.P. Infrastructure for secure short message transmission
US9819679B1 (en) 2015-09-14 2017-11-14 Sprint Communications Company L.P. Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers
US10282719B1 (en) 2015-11-12 2019-05-07 Sprint Communications Company L.P. Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit
US9817992B1 (en) 2015-11-20 2017-11-14 Sprint Communications Company Lp. System and method for secure USIM wireless network access
US10311246B1 (en) 2015-11-20 2019-06-04 Sprint Communications Company L.P. System and method for secure USIM wireless network access
US10499249B1 (en) 2017-07-11 2019-12-03 Sprint Communications Company L.P. Data link layer trust signaling in communication network

Similar Documents

Publication Publication Date Title
US6363150B1 (en) Billing method for customers having IP telephony service with multiple levels of security
US5745556A (en) Interactive and information data services telephone billing system
US5027387A (en) Reverse direction calling system
US8964951B1 (en) Apparatus and methods for telecommunication authentication
US5933480A (en) Method for billing and controlling fraud in providing pay information services
US5301246A (en) Data communications equipment security device using calling party directory number
US6738461B2 (en) Methods and apparatus for returning a call over a telephony system
US5809125A (en) Method and apparatus for intercepting potentially fraudulent telephone calls
US6990332B2 (en) Method and system for transmitting subscriber-specific information in a telecommunication system
EP1084542B1 (en) System and method for secured network access
US6259779B1 (en) Method and apparatus for generating and/or updating an authorization list associated with a telephone subscriber
JPH04330898A (en) Method and device for protecting privacy of telephone system
JPH07203000A (en) Safety mode telecommunication
US20060210032A1 (en) Multilevel dynamic call screening
JPH07183883A (en) Safety mode telecommunication
US20130182703A1 (en) System and method for providing automatic determination of a call type in telephony services over a data network
EP0952742B1 (en) Point-to-point-to-point calling
US6343117B1 (en) Method of initiating a telephone security feature
US5764732A (en) Called party mailbox service
US6556662B1 (en) Method and apparatus for providing dialed number verification
JP2625460B2 (en) Method of specifying call route in telephone exchange system
US7876887B2 (en) Selectively adding a third party to a collect call
US7643624B2 (en) Remote line access for a multi-line residential telephone
CA2167215A1 (en) Method to provide voice call notification and control messaging over a data path
US20110110506A1 (en) Selectively adding a third party to a collect call

Legal Events

Date Code Title Description
AS Assignment

Owner name: AT&T CORP, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BHAGAVATH, VIJAY K;WALKER, HOPETON S;REEL/FRAME:010886/0146;SIGNING DATES FROM 20000301 TO 20000404

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12